Deep defense: Training dnns with improved adversarial robustness Z Yan, Y Guo, C Zhang Advances in Neural Information Processing Systems, 2018 | 138 | 2018 |
Subspace attack: Exploiting promising subspaces for query-efficient black-box attacks Z Yan, Y Guo, C Zhang Advances in Neural Information Processing Systems, 2019 | 106 | 2019 |
Weakly-and semi-supervised object detection with expectation-maximization algorithm Z Yan, J Liang, W Pan, J Li, C Zhang arXiv preprint arXiv:1702.08740, 2017 | 55 | 2017 |
Sill-net: Feature augmentation with separated illumination representation H Zhang, Z Cao, Z Yan, C Zhang arXiv preprint arXiv:2102.03539, 2021 | 35 | 2021 |
Zero-shot learning by generating pseudo feature representations J Lu, J Li, Z Yan, C Zhang arXiv preprint arXiv:1703.06389, 2017 | 24 | 2017 |
Attribute-based synthetic network (abs-net): Learning more from pseudo feature representations J Lu, J Li, Z Yan, F Mei, C Zhang Pattern Recognition 80, 129-142, 2018 | 22 | 2018 |
Neural network architecture optimization through submodularity and supermodularity J Jin, Z Yan, K Fu, N Jiang, C Zhang arXiv preprint arXiv:1609.00074, 2016 | 21 | 2016 |
Policy-Driven Attack: Learning to Query for Hard-label Black-box Adversarial Examples Z Yan, Y Guo, J Liang, C Zhang International Conference on Learning Representations (ICLR), 2021 | 20 | 2021 |
FMA-ETA: Estimating Travel Time Entirely Based on FFN With Attention Y Sun, Y Wang, K Fu, Z Wang, Z Yan, C Zhang, J Ye International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020 | 17 | 2020 |
Adversarial margin maximization networks Z Yan, Y Guo, C Zhang IEEE Transactions on Pattern Analysis and Machine Intelligence, 2019 | 14 | 2019 |
Rare Chinese character recognition by Radical extraction network Z Yan, C Yan, C Zhang IEEE International Conference on Systems, Man, and Cybernetics (SMC), 924-929, 2017 | 10 | 2017 |
Learning fast approximations of sparse nonlinear regression Y Song, Z Cao, K Wu, Z Yan, C Zhang arXiv preprint arXiv:2010.13490, 2020 | 2 | 2020 |
Optimizing recurrent neural networks architectures under time constraints J Jin, Z Yan, K Fu, N Jiang, C Zhang arXiv preprint arXiv:1608.07892, 2016 | 2 | 2016 |
Subspace Attack: Exploiting Promising Subspaces for Query-Efficient Black-box Attacks Supplementary Material Z Yan, Y Guo, C Zhang | | |
Supplementary Material for Deep Defense: Training DNNs with Improved Adversarial Robustness Z Yan, Y Guo, C Zhang | | |